Package: debian-handbook Version: 6.0+20120509 Severity: minor Tags: patch The attached patch changes the spelling of many words to US English. I wouldn't normally bother, but the language is specifically listed as "en-US" so it seems appropriate. I'm submitting this separately from the other spelling patches so you can easily reject these if you like.
-- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 3.2.0-2-686-pae (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- no debconf information
--- a/en-US/04_installation.xml +++ b/en-US/04_installation.xml @@ -535,7 +535,7 @@ timestamps on logs will be correct from the first boot. For them to remain consistently precise over time, an NTP daemon needs to be set up after initial installation (see <xref - linkend="section.synchronisation-horaire"/>).</para> + linkend="section.synchronization-horaire"/>).</para> </section> <section> <title>Administrator Password</title> --- a/en-US/08_basic-configuration.xml +++ b/en-US/08_basic-configuration.xml @@ -395,7 +395,7 @@ $ </computeroutput><userinput>ls travail/</userinput> <para>A router is a machine that connects several networks to each other. All traffic coming through a router is guided to the correct - network. To do this, the router analyses incoming packets and + network. To do this, the router analyzes incoming packets and redirects them according to the IP address of their destination. The router is often known as a gateway; in this configuration, it works as a machine that helps reach out beyond a local network (towards an @@ -1961,7 +1961,7 @@ macosx=/dev/sda5 autumn).</para> </sidebar> </section> - <section id="section.synchronisation-horaire"> + <section id="section.synchronization-horaire"> <title>Time Synchronization</title> <indexterm><primary>time synchronization</primary></indexterm> <indexterm><primary>clock</primary><secondary>synchronization</secondary></indexterm> --- a/en-US/10_network-infrastructure.xml +++ b/en-US/10_network-infrastructure.xml @@ -1245,7 +1245,7 @@ if_prefix=eth0 dedicated to software specially rebuilt for IPv6; this archive was decommissioned in March 2007, both for lack of time and for lack of interest (since most of the patches have been integrated into the - official packages). If your favourite package does not work with IPv6 + official packages). If your favorite package does not work with IPv6 yet, help can be found on the <emphasis>debian-ipv6</emphasis> mailing-list. <ulink type="block" url="http://lists.debian.org/debian-ipv6/"/></para> --- a/en-US/11_network-services.xml +++ b/en-US/11_network-services.xml @@ -430,7 +430,7 @@ smtpd_client_restrictions = permit_mynetworks, last. Each rule can accept the message, reject it, or leave the decision to a following rule. As a consequence, order matters, and simply switching two rules can lead to a widely different - behaviour.</para> + behavour.</para> <para>The <literal>permit_mynetworks</literal> directive, used as the first rule, accepts all emails coming from a machine in the @@ -988,7 +988,7 @@ SOCKET=inet:10002@127.0.0.1 some important parameters can still be customized with <command>dpkg-reconfigure clamav-base</command>. Similarly, running <command>dpkg-reconfigure clamav-milter</command> allows defining the - mail filter's behaviour in some detail.</para> + mail filter's behavour in some detail.</para> <para>The last step involves telling Postfix to use the recently-configured filter. This is a simple matter of adding the @@ -1007,7 +1007,7 @@ smtpd_milters = inet:[127.0.0.1]:10002 <sidebar> <title><emphasis>IN PRACTICE</emphasis> Testing the antivirus</title> - <para>Once the antivirus is set up, its correct behaviour should be + <para>Once the antivirus is set up, its correct behavour should be tested. The simplest way to do that is to send a test email with an attachment containing the <filename>eicar.com</filename> (or <filename>eicar.com.zip</filename>) file, which can be downloaded @@ -1197,7 +1197,7 @@ relay_host = [mail.falcot.com] <para>Another possibility is to use a dedicated MPM, such as the one provided by <emphasis role="pkg">apache2-mpm-itk</emphasis>. - This particular one has a slightly different behaviour: it allows + This particular one has a slightly different behavour: it allows “isolating” virtual hosts so that they each run as a different user. A vulnerability in one website therefore cannot compromise files belonging to the owner of another website.</para> @@ -1259,7 +1259,7 @@ relay_host = [mail.falcot.com] (which only works in version 1.1 of the HTTP protocol — fortunately that version is old enough that all clients use it already).</para> - <para>The (increasing) scarcity of IPv4 addresses usually favours the + <para>The (increasing) scarcity of IPv4 addresses usually favors the second method; however, it is made more complex if the virtual hosts need to provide HTTPS too, since the SSL protocol hasn't always provided for name-based virtual hosting; the SNI extension @@ -1963,7 +1963,7 @@ options lockd nlm_udpport=2045 nlm_tcpport=2045 <para>In order to not give root access to the filesystem to any NFS client, all queries appearing to come from a root user are considered by the server as coming from the <literal>anonymous</literal> user. - This behaviour corresponds to the <literal>root_squash</literal> + This behavour corresponds to the <literal>root_squash</literal> option, and is enabled by default. The <literal>no_root_squash</literal> option, which disables this behavior, is risky and should only be used in controlled --- a/en-US/12_advanced-administration.xml +++ b/en-US/12_advanced-administration.xml @@ -98,7 +98,7 @@ increase in data safety without requiring investing in expensive high-end disks. Probably due to image concerns, however, it's now more customarily considered to stand for - <emphasis>independent</emphasis>, which doesn't have the unsavoury + <emphasis>independent</emphasis>, which doesn't have the unsavory flavour of cheapness.</para> </sidebar> @@ -498,7 +498,7 @@ Working Devices : 2 state of a RAID mirror is that both disks have exactly the same contents. However, nothing guarantees this is the case when the volume is first created. The RAID subsystem will therefore provide - that guarantee itself, and there will be a synchronisation phase as + that guarantee itself, and there will be a synchronization phase as soon as the RAID device is created. After some time (the exact amount will depend on the actual size of the disks…), the RAID array switches to the “active” state. Note that during this @@ -506,7 +506,7 @@ Working Devices : 2 redundancy isn't assured. A disk failing during that risk window could lead to losing all the data. Large amounts of critical data, however, are rarely stored on a freshly created RAID array before - its initial synchronisation. Note that even in degraded mode, the + its initial synchronization. Note that even in degraded mode, the <filename>/dev/md1</filename> is usable, and a filesystem can be created on it, as well as some data copied on it.</para> @@ -521,12 +521,12 @@ Working Devices : 2 <filename>missing</filename> instead of a device file as one of the arguments to <command>mdadm</command>. Once the data have been copied to the “mirror”, the old disk can be added to the - array. A synchronisation will then take place, giving us the + array. A synchronization will then take place, giving us the redundancy that was wanted in the first place.</para> </sidebar> <sidebar> - <title><emphasis>TIP</emphasis> Setting up a mirror without synchronisation</title> + <title><emphasis>TIP</emphasis> Setting up a mirror without synchronization</title> <para>RAID-1 volumes are often created to be used as a new disk, often considered blank. The actual initial contents of the disk @@ -534,12 +534,12 @@ Working Devices : 2 the data written after the creation of the volume, in particular the filesystem, can be accessed later.</para> - <para>One might therefore wonder about the point of synchronising + <para>One might therefore wonder about the point of synchronizing both disks at creation time. Why care whether the contents are identical on zones of the volume that we know will only be read after we have written to them?</para> - <para>Fortunately, this synchronisation phase can be avoided by + <para>Fortunately, this synchronization phase can be avoided by passing the <literal>--assume-clean</literal> option to <command>mdadm</command>. However, this option can lead to surprises in cases where the initial data will be read (for @@ -1032,7 +1032,7 @@ brw-rw---- 1 root disk 253, 2 5 oct. 18:14 /dev/dm-2</computeroutput> <para>When the computer boots, the <filename>/etc/init.d/lvm</filename> script scans the available - devices; those that have been initialised as physical volumes for + devices; those that have been initialized as physical volumes for LVM are registered into the LVM subsystem, those that belong to volume groups are assembled, and the relevant logical volumes are started and made available. There is therefore no need to edit @@ -1256,7 +1256,7 @@ The filesystem on /dev/vg_critical/lv_files is now 1835008 blocks long. <para>Let's take a concrete example: the public relations department at Falcot Corp needs a workstation for video editing, but the department's budget doesn't allow investing in high-end hardware from - the bottom up. A decision is made to favour the hardware that is + the bottom up. A decision is made to favor the hardware that is specific to the graphic nature of the work (monitor and video card), and to stay with generic hardware for storage. However, as is widely known, digital video does have some particular requirements for its @@ -1580,7 +1580,7 @@ Disk identifier: 0x00039a9f </screen> <para>Once these prerequisites are installed, the next step is to - test the behaviour of the dom0 by itself; this involves a reboot to + test the behavour of the dom0 by itself; this involves a reboot to the hypervisor and the Xen kernel. The system should boot in its standard fashion, with a few extra messages on the console during the early initialization steps.</para> @@ -1876,7 +1876,7 @@ testxen login: </computeroutput> <para>Xen has many more features than we can describe in these few paragraphs. In particular, the system is very dynamic, and many parameters for one domain (such as the amount of allocated memory, - the visible hard drives, the behaviour of the task scheduler, and + the visible hard drives, the behavour of the task scheduler, and so on) can be adjusted even when that domain is running. A domU can even be migrated across servers without being shut down, and without losing its network connections! For all these advanced @@ -2429,7 +2429,7 @@ to the console to complete the installation process. <callout arearefs="virtinst.network"> <para>The <literal>--network</literal> specifies how the virtual network card integrates in the host's network - configuration. The default behaviour (which we explicitly + configuration. The default behavour (which we explicitly forced in our example) is to integrate it into any pre-existing network bridge. If no such bridge exists, the virtual machine will only reach the physical network through NAT, so it gets an @@ -2438,7 +2438,7 @@ to the console to complete the installation process. <callout arearefs="virtinst.vnc"> <para><literal>--vnc</literal> states that the graphical console should be made available using VNC. The default - behaviour for the associated VNC server is no only listen on + behavour for the associated VNC server is no only listen on the local interface; if the VNC client is to be run on a different host, establishing the connection will require setting up an SSH tunnel (see <xref --- a/en-US/13_workstation.xml +++ b/en-US/13_workstation.xml @@ -115,8 +115,8 @@ when the provided driver exists, it is usually not as polished as it should be; more importantly, it does not necessarily follow the X.org updates, which may prevent the latest available driver from loading - correctly (or at all). We cannot condone this behaviour, and we - recommend you avoid these makers and favour more cooperative + correctly (or at all). We cannot condone this behavour, and we + recommend you avoid these makers and favor more cooperative manufacturers.</para> <para>If you still end up with such a card, you will find the @@ -710,7 +710,7 @@ <title>Tools for GTK+ on GNOME</title> <para>Anjuta (in the <emphasis role="pkg">anjuta</emphasis> - package) is a development environment optimised for creating GTK+ + package) is a development environment optimized for creating GTK+ applications for GNOME. Glade (in the <emphasis role="pkg">glade</emphasis> package) is an application designed to create GTK+ graphical interfaces for GNOME and save them in an XML --- a/en-US/14_security.xml +++ b/en-US/14_security.xml @@ -281,7 +281,7 @@ a packet, the firewall scans the appropriate chain, one rule after another; when the conditions for one rule are met, it “jumps” (hence the <literal>-j</literal> option in the commands) to the - specified action to continue processing. The most common behaviours + specified action to continue processing. The most common behavours are standardized, and dedicated actions exist for them. Taking one of these standard actions interrupts the processing of the chain, since the packet's fate is already sealed (barring an exception mentioned @@ -642,7 +642,7 @@ iface eth0 inet static restricted to guaranteeing data confidentiality, but it also includes ensuring availability of the services. It is therefore imperative to check that everything works as expected, and to detect in a timely - manner any deviant behaviour or change in quality of the service(s) + manner any deviant behavour or change in quality of the service(s) rendered. Monitoring activity can enable the detection of intrusion attempts and enable a swift reaction before they cause grave consequences. This section reviews some tools that can be used to @@ -968,7 +968,7 @@ iface eth0 inet static </sidebar> <para>Many options in <filename>/etc/default/aide</filename> can be - used to tweak the behaviour of the <emphasis + used to tweak the behavour of the <emphasis role="pkg">aide</emphasis> package. The AIDE configuration proper is stored in <filename>/etc/aide/aide.conf</filename> and <filename>/etc/aide/aide.conf.d/</filename> (actually, these files @@ -1468,7 +1468,7 @@ user_u user s0 s0 user_r tcp 8080</command>.</para> <para>Some SELinux modules export boolean options that you can - tweak to alter the behaviour of the default rules. The + tweak to alter the behavour of the default rules. The <command>getsebool</command> utility can be used to inspect those options (<command>getsebool <replaceable>boolean</replaceable></command> displays one option, @@ -1751,7 +1751,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) <para>However, an empirical approach is possible. Once the relevant objects are correctly labeled, you can use the application in permissive mode: the operations that would be - forbidden are logged but still succeed. By analysing the logs, you + forbidden are logged but still succeed. By analyzing the logs, you can now identify the operations to allow. Here is an example of such a log entry:</para> @@ -2011,7 +2011,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) of the active connections, and so on. Using the root permissions, the attacker was able to observe the whole system, but didn't find important data; so they will try accessing other machines in the - corporate network. Analysing the administrator's account and the + corporate network. Analyzing the administrator's account and the history files, the attacker finds what machines are routinely accessed. By replacing <command>sudo</command> or <command>ssh</command> with a subverted program, the attacker can @@ -2276,7 +2276,7 @@ files_tmp_filetrans(myapp_t,myapp_tmp_t,file) <sidebar> <title><emphasis>CAUTION</emphasis> Hot analysis</title> - <para>While it may seem tempting to analyse the system as it runs, + <para>While it may seem tempting to analyze the system as it runs, especially when the server is not physically reachable, this is best avoided: quite simply you can't trust the programs currently installed on the compromised system. It's quite possible for a --- a/en-US/15_debian-packaging.xml +++ b/en-US/15_debian-packaging.xml @@ -117,7 +117,7 @@ …</literal>) are easy to spot. If these commands are not explicitly called, they are probably a side effect of another explicit command, in which case please refer to their documentation to learn more about - how to change the default behaviour.</para> + how to change the default behavour.</para> <para>Depending on the local changes to the packages, an update may also be required in the <filename>debian/control</filename> file, @@ -542,7 +542,7 @@ target: sources contains only the bare minimum for running a standard set of commands provided by the <command>debhelper</command> tool. Such is the case for files generated by <command>dh_make</command>. To install our - files, we simply configure the behaviour of the + files, we simply configure the behavour of the <command>dh_install</command> command by creating the following <filename>debian/falcot-data.install</filename> file:</para> --- a/en-US/92_short-remedial-course.xml +++ b/en-US/92_short-remedial-course.xml @@ -744,7 +744,7 @@ Bus 002 Device 004: ID 413c:8103 Dell Computer Corp. Wireless 350 Bluetooth process, and stops giving it slices of running time. The parent process is told about its child process being terminated, which allows a process to wait for the completion of a task it delegated to - a child process. This behaviour is plainly visible in command-line + a child process. This behavour is plainly visible in command-line interpreters (known as <emphasis>shells</emphasis>). When a command is typed into a shell, the prompt only comes back when the execution of the command is over. Most shells allow for running the command in